Venom RAT detection with Wazuh
In this blog post, we demonstrated how to detect Venom RAT activities with Wazuh utilizing Sysmon to enrich logs from the victim endpoint.
In this blog post, we demonstrated how to detect Venom RAT activities with Wazuh utilizing Sysmon to enrich logs from the victim endpoint.
DarkWatchman is a JavaScript Remote Access Trojan (RAT) paired with a C# keylogger that targets Windows endpoints. It provides attackers with the ability to establish connections to compromised systems, facilitating the unauthorized extraction of sensitive data. The RAT exhibits malicious functionalities which include the ability to capture keystrokes and monitor clipboard data. A notable characteristic […]
Integrating security solutions with your current infrastructure can extend security monitoring capabilities. Wazuh is an open source unified XDR and SIEM platform that offers compatibility and integration options with other indexing and visualization platforms, such as Elastic Stack. Integrating Wazuh and Elastic Stack enriches your security monitoring approach by providing the flexibility to manage and […]
OSSEC is an open source host-based Intrusion Detection System (IDS) that provides log analysis, integrity monitoring, real-time alerting, and active response capabilities. In recent years, the OSSEC project has been in maintenance mode with limited emphasis on active development. In 2015, the Wazuh team decided to fork the project, expanding upon the OSSEC core functionalities […]
Grype is a lightweight, open source tool for scanning container images and filesystems for vulnerabilities. It examines container image layers and dependencies to identify known vulnerabilities in the software packages installed within the image. By inspecting each layer and its contents, Grype helps you proactively uncover potential security risks before deploying the container image into […]
PureHVNC is a Remote Access Trojan (RAT) that focuses specifically on the stealthy remote control of Windows endpoints. The HVNC in PureHVNC stands for “Hidden Virtual Network Computing.” This means attackers can manipulate an endpoint remotely without the user’s awareness. PureHVNC malware is usually distributed through phishing campaigns that use urgent messaging to deceive victims […]
Snake keylogger, also known as “404 Keylogger” or “KrakenKeylogger” is a .NET-based trojan designed to target Windows endpoints and steal sensitive information. It is typically spread through phishing campaigns and can exfiltrate saved credentials from web browsers, email clients, and other commonly used applications. In addition, it can capture keystrokes, screenshots, and data from the […]
Maintaining the security of containerized environments is an important part of modern IT infrastructure. Vulnerabilities in container images and runtime environments expose organizations to significant risks, which makes proactive vulnerability scanning an essential practice. Trivy is an open source vulnerability scanner designed for containers, filesystems, and software dependencies. It supports a range of targets including […]
Please make sure that all words are spelled correctly.